Artwork

محتوای ارائه شده توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !
icon Daily Deals

E21 - One Password to Rule Them All: The Case for Password Managers in the Enterprise

32:15
 
اشتراک گذاری
 

Manage episode 436232437 series 3555974
محتوای ارائه شده توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
- Hosts: Anthony and Tanner, IT executives with 35 years of combined experience. - Episode Title: One Password to Rule Them All: The Case for Password Managers in the Enterprise. - Overview: Discussing the importance and benefits of password managers in the enterprise, sparked by personal experiences. Segment 1: The Need for Password Managers Problem Statement: - Frequent issues with lost passwords and user frustration with managing multiple complex passwords. - Importance of providing a password manager to prevent unapproved, less secure solutions. - 34% of employees use unapproved apps/tools, increasing security risks. Segment 2: Benefits of Enterprise Password Managers Security & Convenience: - Simplifies creation of complex passwords and supports MFA. - Allows secure sharing of passwords within teams. - Can lower cybersecurity insurance costs and help with compliance. Segment 3: Choosing the Right Password Manager** Open Source vs. Closed Source: - Open Source: Transparency, community review (e.g., KeePass, Bitwarden). - Closed Source: Often better support and UI (e.g., Keeper, 1Password). Tool Highlights: - Bitwarden: Open source, highly secure, supports self-hosting. - Keeper: Closed source, user-friendly, dark web monitoring. - LastPass: Not recommended due to past security breaches. Segment 4: Implementation Tips Start Small: - Pilot with a small, tech-savvy group. - Gradual rollout with strong training and support. Balance Security and Usability: - Tailor security settings to user needs and require MFA. Segment 5: The Future - Passkeys Passkeys Overview: - Passwordless authentication using cryptographic keys, a potential future replacement for passwords. Conclusion: Final Thoughts: - Encourage providing password managers that align with security policies. - Call to Action: Subscribe, share, and provide feedback for future episodes. - Closing Remarks: Thanks to listeners and recent giveaway winners.
  continue reading

46 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 436232437 series 3555974
محتوای ارائه شده توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Anthony Kent & Tanner Greer, Anthony Kent, and Tanner Greer یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
- Hosts: Anthony and Tanner, IT executives with 35 years of combined experience. - Episode Title: One Password to Rule Them All: The Case for Password Managers in the Enterprise. - Overview: Discussing the importance and benefits of password managers in the enterprise, sparked by personal experiences. Segment 1: The Need for Password Managers Problem Statement: - Frequent issues with lost passwords and user frustration with managing multiple complex passwords. - Importance of providing a password manager to prevent unapproved, less secure solutions. - 34% of employees use unapproved apps/tools, increasing security risks. Segment 2: Benefits of Enterprise Password Managers Security & Convenience: - Simplifies creation of complex passwords and supports MFA. - Allows secure sharing of passwords within teams. - Can lower cybersecurity insurance costs and help with compliance. Segment 3: Choosing the Right Password Manager** Open Source vs. Closed Source: - Open Source: Transparency, community review (e.g., KeePass, Bitwarden). - Closed Source: Often better support and UI (e.g., Keeper, 1Password). Tool Highlights: - Bitwarden: Open source, highly secure, supports self-hosting. - Keeper: Closed source, user-friendly, dark web monitoring. - LastPass: Not recommended due to past security breaches. Segment 4: Implementation Tips Start Small: - Pilot with a small, tech-savvy group. - Gradual rollout with strong training and support. Balance Security and Usability: - Tailor security settings to user needs and require MFA. Segment 5: The Future - Passkeys Passkeys Overview: - Passwordless authentication using cryptographic keys, a potential future replacement for passwords. Conclusion: Final Thoughts: - Encourage providing password managers that align with security policies. - Call to Action: Subscribe, share, and provide feedback for future episodes. - Closing Remarks: Thanks to listeners and recent giveaway winners.
  continue reading

46 قسمت

All episodes

×
 
AI's Impact on Jobs & Cybersecurity: Off The Wire Podcast Special Edition In this special edition of Off The Wire, IT executives Tanner and Anthony dive deep into a discussion on the impact of artificial intelligence (AI) on the job market and cybersecurity. With 35 years of combined experience, they share personal insights, debate differing viewpoints, and explore the potential future of AI in various industries. They also discuss advice for the younger generation, the role of regulation, and practical use cases of AI in current workflows. Tune in for an engaging conversation packed with expert opinions and thought-provoking questions about the evolving tech landscape. 00:00 Introduction to Off The Wire 00:20 Today's Unique Format 01:18 Diving into AI's Impact on Jobs 01:56 Advice for the Next Generation 04:16 AI in Cybersecurity 06:01 The Double-Edged Sword of AI 08:40 Challenges and Limitations of AI 18:46 Real-World AI Applications 23:16 AI's Current Limitations and Future Potential 23:50 The Challenge of Knowledge Transfer 24:53 AI in the Workplace: Opportunities and Hurdles 27:04 The Future of AI and Human Adaptation 30:01 Speculations on AI's Long-Term Impact 34:44 Embracing AI: Strategies for Success 43:04 Final Thoughts and Call to Action…
 
Mastering IT Training: Best Practices and Pitfalls | Off The Wire Podcast Welcome to Off The Wire, the podcast that helps you curb your cybersecurity risk and tackle technology challenges. In this episode, hosts Tanner and Anthony dive deep into the intricacies of technology training. They discuss how current training methods can be improved, the importance of training throughout the lifecycle of technology, and share real-world success stories and challenges. The conversation also touches on the role of AI in future training methods, the impact of organizational size, and the importance of having dedicated training personnel. Tune in to learn how to make training more engaging and effective in your organization! 00:00 Introduction to Off The Wire Podcast 00:20 Technology Training Overview 01:08 Challenges in Technology Training 05:52 Effective Training Methods 07:34 Training Tools and Techniques 21:25 The Role of AI in Training 26:34 Real-World Training Successes 33:18 Conclusion and Next Episode Teaser…
 
Mastering System Monitoring: Essential Techniques and Tools | Off The Wire Podcast Welcome back to Off The Wire Podcast! Join Tanner and Anthony, IT executives with 35 years of experience, as they delve into the crucial topic of system monitoring. Discover why this less-than-flashy software is indispensable for maintaining reliability and preempting issues before they impact end users. Learn about the key tools available, both open-source and paid, and explore how to effectively set up your environment. Also, hear unique use cases and war stories that underscore the value of robust system monitoring. Don't forget to subscribe for more insights on tackling cybersecurity risks and technology challenges. Share with friends to help our community grow! 00:00 Introduction to Off The Wire Podcast 00:50 The Importance of System Monitoring 04:00 Key Components to Monitor 06:05 Open Source and Paid Monitoring Tools 12:36 Agent-Based vs. Agentless Monitoring 14:23 Managing Alerts and False Positives 17:49 Benchmarking and Performance Metrics 20:52 Unique Monitoring Alerts 21:29 API and Service Monitoring 22:18 VMware Snapshots and Password Expirations 23:51 User Account Monitoring 24:32 Application-Specific Monitoring 26:43 War Stories: Monitoring in Action 32:59 The Importance of System Monitoring 38:05 Final Thoughts and Takeaways 41:34 Closing Remarks and Listener Engagement…
 
Unpacking the 2025 Verizon DBIR Report: Key Cybersecurity Insights for SMBs Welcome back to Off The Wire! In this episode, hosts Tanner and Anthony dive deep into the 2025 Verizon Data Breach Investigations Report (DBIR). With 35 years of combined IT experience, they discuss the evolving threat landscape, notable trends in cybersecurity, and the importance of proactively researching and analyzing risks. From third party breaches and rising ransomware attacks to the increasing impact of AI and the critical role of patch management, we break down the actionable insights every small to medium-sized business needs to know. Tune in to understand the current cybersecurity dynamics and how they can affect your organization. Don’t forget to subscribe and share the podcast to help us grow and aid others in their cybersecurity journey! 00:00 Introduction to Off The Wire Podcast 00:20 Diving into the Evolving Threat Landscape 01:14 Unpacking Verizon's DBIR Report 04:11 Notable Trends and Rising Threats 04:25 Third Party Breaches and Risks 09:09 Ransomware: Trends and Insights 14:03 Espionage and Nation-State Threats 18:11 Understanding Attack Vectors 23:03 Mitigating Zero-Day Exploits 23:34 Importance of Regular Scanning and Patching 24:19 Internal vs External Vulnerability Management 25:21 Credentialed Vulnerability Scans 28:14 BYOD and Credential Security 30:43 AI's Role in Cybersecurity 34:23 Phishing and Training Effectiveness 35:43 Ransomware Threats to SMBs 37:17 Backup Strategies and Recovery 43:43 Final Thoughts and Encouragement…
 
Is the Phone Call Dead? Office Communications in Modern Workspaces In this episode of 'Off the Wire,' IT executives Tanner and Anthony dive into the evolution of office communications, discussing whether phone calls are becoming obsolete. They explore the use of chat applications like Microsoft Teams, the rise of email, and the role of face-to-face interactions. The discussion also covers the generational differences in communication preferences, the potential impact of AI on office communication, and the integration of third-party vendors through chat systems. Tune in to gain insights into how technology is reshaping workplace interactions and managing cybersecurity risks. 00:00 Introduction to Off The Wire Podcast 00:21 Is the Phone Call Dead? 01:03 Current Communication Methods in Modern Offices 01:27 Internal vs External Communication Preferences 06:27 Evolution of Phone Systems 14:14 The Rise of Chat Systems 18:35 Generational Differences in Communication 21:02 Generational Differences in Communication Styles 21:51 The Role of Punctuation and Informality in Chats 23:12 Departmental Variations in Communication 24:31 Choosing the Right Communication Medium 28:07 AI's Impact on Office Communication 35:25 Third-Party Collaboration and Security Concerns 42:11 Final Thoughts and Recommendations…
 
Shadow IT: Identifying and Managing Unauthorized Technology Use In this episode of 'Off the Wire,' Tanner and Anthony discuss 'Shadow IT' and its implications on organizational security and efficiency. They delve into concrete examples, such as unauthorized software subscriptions and unapproved hardware purchases. Tanner and Anthony provide insights on why users engage in Shadow IT and the risks associated with it. They emphasize the importance of communication and understanding user needs to manage and potentially reduce Shadow IT. They also share practical tips and tools for identifying and mitigating the risks related to unauthorized technology use within an organization. 00:00 Introduction and Welcome 00:49 Understanding Shadow IT 01:36 Real-Life Examples of Shadow IT 03:20 Addressing Shadow IT Concerns 08:48 Risks and Security Implications 11:48 Tools and Strategies to Detect Shadow IT 15:59 Effective Communication and User Engagement 24:33 Final Thoughts and Conclusion…
 
Mastering Technology Evaluations: Insights for IT Executives In this episode of 'Off The Wire,' IT executives Tanner and Anthony delve into the intricacies of technology evaluations, covering both hardware and software. With 35 years of combined experience, they discuss the importance of starting with the 'why,' involving the right people, and the significance of demos, pricing, and references. They also explore best practices for evaluating new vendors and products to ensure successful implementation. Whether you're an IT leader or simply interested in technology strategies, this episode offers practical advice you won't want to miss. Don't forget to subscribe and share if you find our content valuable! 00:00 Introduction to Off The Wire Podcast 00:32 Subscribe and Support 00:54 Starting Technology Evaluations 01:38 Involving the Right People 03:24 Balancing Team Size 05:31 Evaluating IT-Specific Projects 07:22 Objective Evaluation Criteria 17:20 Effective Demo Strategies 24:39 Importance of References 29:43 Considering Price and Value 33:40 Final Thoughts and Conclusion…
 
Mastering Strategic Tech Planning: Communicating with Leadership Effectively In this episode of 'Off the Wire,' we dive deep into the essential topic of strategic technology planning and the importance of effectively communicating these plans to CEOs, executive leaders, and board members. Hosts Anthony and Tanner discuss their personal experiences and approaches to planning, including the facets of building on previous years, incorporating feedback from all company levels, and ensuring alignment with company goals and strategic plans. They emphasize the significance of clear communication, especially avoiding technical jargon when conveying plans to non-technical stakeholders. The episode also tackles the critical aspects of cost, risk, and impact assessment and underscores the importance of a feedback loop post-approval to track progress and continuously refine strategic initiatives. Tune in to learn actionable insights on how to gain trust and buy-in from your organization's leadership for your tech proposals. 00:00 Introduction and Episode Overview 00:42 Importance of Strategic Planning 01:38 Building and Updating Technology Plans 02:46 Involving Other Departments 04:23 Leadership and Strategic Partnerships 07:07 Communicating with Leadership 12:12 Feedback and Continuous Improvement 14:54 Presenting to the Board and CEOs 18:15 Effective Communication Strategies 25:47 Final Thoughts and Tips…
 
Mastering IT Project Management: Tips and Tools for Success Welcome to Off the Wire, the podcast dedicated to helping you manage cybersecurity risks and tackle technology challenges. In this episode, hosts Tanner and Anthony dive deep into the world of project management, specifically IT project management. They begin by recounting their experiences and the critical importance of having clear goals, plans, and user buy-in to make projects successful. They discuss the significance of strong communication, flexibility, and involving end-users in the process for better outcomes. The episode also covers evaluating project management tools such as ClickUp, Asana, and Smartsheet, along with practical tips and tricks to improve project management in your organization. Lastly, the hosts emphasize the need for continuous improvement and leveraging the strengths of your team members. Join Tanner and Anthony as they share valuable insights and real-life experiences to help you master IT project management. 00:00 Introduction to Off The Wire Podcast 00:59 Upcoming Conferences and Events 02:42 Diving into IT Project Management 04:14 Defining Project Success 06:37 Challenges and Lessons in Project Management 16:51 Current Project Management Practices 26:41 Scoring Vendor Demos 28:15 Project Management Tools Overview 30:03 Choosing the Right Tool 33:14 Implementing ClickUp 39:56 Virtual vs. In-Person Meetings 41:08 Effective Communication Strategies 45:03 Cybersecurity in Projects 47:00 Improving Project Management 49:43 Final Thoughts and Wrap-Up…
 
Building a Lasting Security Culture in Your Organization In this episode, hosts Tanner and Anthony, sit down with special guest Fletus Poston, a senior manager of security operations at CrashPlan, to discuss the creation and sustainment of a strong security culture within an organization. Fletus shares his extensive cybersecurity experience and emphasizes a human-centric approach to security. See more from Fletus on his channel: https://youtube.com/@fletusposton?si=OXDTXSBLDgx_jb63 00:00 Introduction to Off The Wire Podcast 00:20 Creating a Lasting Security Culture 00:53 Meet Fletus Poston: A Journey in Cybersecurity 02:34 The Human Element in Security 03:42 Real-World Security Scenarios 07:15 Building a Security Culture in Organizations 08:49 Practical Steps for Enhancing Security 14:23 Effective Communication in Security 23:32 Building Security Champions 23:47 Practical Security Tips for Different Roles 24:50 Creating a Security-Conscious Culture 25:41 Engaging the Board and Leadership 33:35 Gamification and Creative Training Methods 39:06 Mentorship and Knowledge Sharing 42:54 Final Thoughts and Contact Information…
 
Protecting Operational Technology Systems: Tips, Tricks, and Insights In this episode of Off the Wire, Tanner and Anthony dive deep into the world of operational technology (OT) systems, discussing what they are, their importance in various industries, and how to protect them effectively. The duo covers the significance of reliable hardware and software controls, referencing the infamous Stuxnet incident as a wake-up call for OT security. They outline critical controls and practical tips for safeguarding OT environments, from network segmentation to passive monitoring and endpoint security. Tune in to learn actionable strategies to secure your OT systems and ensure operational reliability. 00:00 Introduction and Subscription Request 00:48 Understanding Operational Technology (OT) 02:07 The Importance of OT Security 04:56 Common OT Security Issues 11:13 Critical Controls for OT Security 15:02 Practical Tips for OT Security 25:12 Final Thoughts and Collaboration 26:55 Conclusion and Contact Information…
 
Off the Wire: Exploring Tech Hardware Refreshes and Efficient Setups Join Anthony and Tanner in this insightful episode of Off the Wire as they discuss their philosophies on tech hardware, life cycles, and share their experiences with new tech devices. Whether it's choosing between desktops, laptops, iPads, smartphones, or even drones, Anthony and Tanner cover it all with real-world examples and helpful tips. Don’t miss out on their recommendations for reliable docking stations, innovative conference room setups, and how to handle surplus equipment. Tune in for a comprehensive guide to tech hardware that will help you make informed choices for your setups. 00:00 Introduction and Podcast Promotion 01:12 Philosophy on Hardware 02:09 Experiences with Different Brands 03:26 Desktop and Laptop Preferences 04:01 Challenges with Micro Form Factor PCs 07:58 Memory and Storage Specifications 14:19 Rugged Machines for Field Work 17:41 Monitor Setups and Preferences 21:30 Mobile Devices and iPads 26:36 Device Longevity and Battery Life 26:41 Company Policy on Device Rotation 27:48 Carrier Choices and Coverage 28:10 Private Networks and Device Restrictions 29:03 iPads and Cellular Service 29:39 Company Phones vs. Personal Phones 31:50 Managing Old Equipment 33:14 Internal Auction System 34:39 New Hardware Purchases 35:14 Docking Stations and Conference Room Equipment 41:24 Monitors with Built-in Docking Stations 45:30 Remarkable Tablets for Note-Taking 47:30 Drone Usage and Recommendations 50:51 Final Thoughts and Recommendations…
 
VMware vs. Nutanix: Making the Right Virtualization Choice for Your Business In this episode of 'Off the Wire,' we dive into a major decision facing businesses of all sizes: should you continue using VMware or explore alternatives like Nutanix? With VMware's recent acquisition by Broadcom and subsequent pricing changes, enterprises are re-evaluating their virtualization strategies. Hosts Anthony and Tanner are joined by two special guests: Devin Costa from Jones Onslow EMC and Ben Hubbard from Flint EMC. Devin and Ben share their experiences and insights on sticking with VMware versus transitioning to Nutanix. They discuss pros and cons, cost implications, support structures, and the future of virtualization in their respective organizations. Whether you are contemplating a move or seeking to optimize your current setup, this episode provides valuable perspectives to guide your decision-making process. Don't forget to subscribe, leave a review, and share this episode if you find it helpful! 00:00 Introduction and Topic Overview 00:57 VMware's Acquisition by Broadcom 01:39 Guest Introductions: Devin Costa and Ben Hubbard 03:11 Ben Hubbard's Experience with VMware 09:32 Devin Costa's Experience with Nutanix 14:12 Comparing Costs and Decision-Making Processes 18:03 Future Hardware and Cloud Considerations 26:34 Exploring Cloud Solutions for Disaster Recovery 27:03 The Importance of Virtualization in Modern Infrastructure 27:55 Challenges and Benefits of Virtualization 31:09 Learning and Transitioning to New Virtualization Platforms 33:12 Support Experiences with VMware and Nutanix 40:02 Concerns About Future Price Increases 45:36 Advice for Organizations Considering Virtualization Options 51:53 Final Thoughts and Leadership Insights…
 
Off The Wire: 2024 Tech and Cybersecurity Year in Review & 2025 Predictions In this episode of Off The Wire, hosts Anthony and Tanner cover a detailed review of 2024, focusing on significant advancements and incidents in technology and cybersecurity. They discuss notable headlines like the global IT outage caused by CrowdStrike, the Salt Typhoon incident involving Chinese hackers, and the implications of potential DJI drone bans. The episode delves into the rise of AI and its applications in everyday workflows, the ongoing shift to hybrid cloud models, and the increasing trend towards zero trust security frameworks. As they reflect on the year's technological strides, they also share insights on what to expect in 2025, including potential AI advancements and continued focus on zero trust architectures. Tune in for an engaging discussion on the past year's tech and cybersecurity landscape and a glimpse into the future. 00:00 Introduction and Episode Overview 01:06 Major Cybersecurity Incidents of 2024 01:15 CrowdStrike Global IT Outage 04:24 Salt Typhoon: Chinese Hackers and Telecoms 07:42 The DJI Drone Ban and Chinese Technology Concerns 12:37 The Rise of Generative AI in 2024 13:54 AI Integration in Everyday Tasks 17:22 Power Usage and Limitations of AI 20:33 Shift to OpEx Model and Hybrid Cloud 24:57 Changing Communication Trends 25:28 The Shift from Email to Chat 26:02 The Rise of Internal Chat Systems 30:00 The Impact of Starlink 32:15 Zero Trust Architecture Gains Traction 33:56 Looking Ahead to 2025 35:01 Building Internal AI Systems 37:28 AI Use Cases and Challenges 48:34 Optimizing Existing Technologies 50:02 Wrapping Up and Listener Engagement…
 
Critical Alerts in Cybersecurity: Best Practices to Avoid Alert Fatigue | Off The Wire Podcast Welcome to Off The Wire, the podcast that helps you curb cybersecurity risks and tackle technology challenges. In this episode, IT executives Tanner and Anthony share insights on effective alert systems in cybersecurity. Drawing from their combined 35 years of experience, they discuss real-life scenarios, types of alerts crucial for situational awareness, and strategies to prevent alert fatigue. They also explore alert sources, essential configurations, and future considerations for OT environments. Join us to better understand how to tailor your alert system for optimal performance and security. Remove info from Zoom Info Trust Center | ZoomInfo 00:00 Introduction to Off The Wire Podcast 00:24 A Real-World Cybersecurity Incident 01:11 Understanding and Managing Alerts 03:50 Endpoint Detection and Response (EDR) Alerts 07:21 Domain and Firewall Alerts 12:58 Multi-Factor Authentication (MFA) and Network Activity Alerts 20:19 Situational Awareness and Account Hygiene 23:06 Environment Hygiene and Group Policy Changes 23:54 Firewall Commit Alerts and Protocols 25:32 Backup Alerts: Successes and Failures 27:11 Endpoint Monitoring and USB Drive Policies 28:39 Misconfigurations and VM Backups 29:22 MFA Bypass and Snapshot Alerts 31:41 Application Installations and Phishing Attacks 35:00 Physical Security and Surveillance 36:34 Future Alerts and Vulnerability Tools 37:57 Alert Sources and SIEM Alternatives 39:20 Managing Alert Fatigue 46:05 Final Thoughts and Listener Engagement…
 
Mastering Microsoft 365: Tips, Tricks, and Best Practices In Episode 28 of the 'Off the Wire' podcast, hosts Tanner and Anthony delve into Microsoft 365 (Office 365), offering a comprehensive guide on migrating, optimizing, and securing the suite. The episode covers essential aspects like hybrid architecture configurations, licensing tiers, and the importance of 2FA and logging for security. They also explore tools like Outlook, Teams, OneDrive, and SharePoint, providing actionable insights on feature utilization, retention policies, and efficient file sharing. Along with personal anecdotes and practical tips, this episode is a must-listen for IT professionals looking to maximize their organization's use of Microsoft 365. 00:00 Introduction and Episode Overview 00:49 Thanksgiving Recap and Personal Stories 01:37 General Tips for Microsoft 365 Migration 03:02 Licensing and Vendor Recommendations 05:33 Retention Policies and Legal Holds 07:11 Training and Continuous Learning 09:50 Backup Solutions and Internet Redundancy 13:42 Automation and Efficiency in Microsoft 365 15:57 Security Best Practices 20:47 Outlook and Exchange Tips 24:52 Microsoft Teams Tips 29:59 OneDrive Tips 35:11 SharePoint Tips 41:57 Conclusion and Final Thoughts…
 
Cloud Dreams vs. On-Prem Realities | Episode 27 In this episode of 'Off The Wire,' hosts Anthony and Tanner tackle the ongoing debate between cloud and on-premise solutions: 'Cloud Dreams vs. On-Prem Realities.' They discuss myths, pros, and cons of each, share their experiences, and delve into specific scenarios and examples, such as cost implications, security considerations, and integration challenges. They also explore the future of hybrid environments and how businesses can navigate these choices effectively. Tune in to gain insights and practical advice on making the best decisions for your IT infrastructure. 00:00 Introduction and Episode Overview 01:34 Cloud vs On-Premise: Personal Experiences 02:57 First Steps into the Cloud 04:30 The Ongoing Debate: Cloud or On-Premise? 09:22 Advantages of Cloud Solutions 17:51 On-Premise Benefits and Cost Considerations 25:22 Real-World Scenarios and Lessons Learned 27:15 Second Guessing Decisions During the Storm 27:43 Inherited Cloud Solutions and Their Challenges 29:05 On-Premise Phone System Issues 29:43 Deciding Between Cloud and On-Premise Solutions 31:20 Surprises and Costs in Cloud Services 33:27 Security Concerns in Cloud vs. On-Premise 42:41 Building IT Infrastructure from Scratch 46:09 Future Plans and Final Advice 52:41 Closing Remarks and Listener Engagement…
 
O
Off the Wire: A Play by Play on Cybersecurity and Technology Issues
Off the Wire: A Play by Play on Cybersecurity and Technology Issues podcast artwork
 
Mastering Customer Service in IT: Strategies and Best Practices In this episode, we dive into the importance of customer service within IT departments, emphasizing its crucial role in driving innovation and improving user satisfaction. We discuss how IT professionals can develop and hone their customer service skills, the importance of effective hiring practices, and the benefits of using tools like ticketing systems to manage and resolve issues efficiently. We also touch on the significance of empathy, building trust and credibility, and maintaining good relations with other departments. Tune in for valuable tips and insights on enhancing customer service in your IT organization. 00:00 Introduction to Customer Service in IT 01:17 Challenges IT Professionals Face with Customer Service 02:38 The Importance of Hiring the Right People 04:50 Key Attributes for Customer Service Excellence 07:57 The Role of IT in Enhancing Business Efficiency 15:34 Proactive vs. Reactive IT Support 20:25 Implementing Effective Ticketing Systems 28:14 Building Relationships and Empathy 39:46 Maintaining High Morale for Better Service 40:38 Final Thoughts and Encouragement…
 
In this comprehensive episode, we explore critical aspects of managing IT security, focusing on Active Directory audits, password hygiene, and privilege management. We share practical strategies for conducting thorough security audits, managing group policies, and ensuring effective password practices using tools like CrowdStrike and Microsoft Azure. Emphasis is placed on minimizing over-privileged accounts, leveraging secure remote access tools, and implementing Multi-Factor Authentication (MFA) to enhance security. The discussion extends to the importance of dynamic employee groups, regular auditing of both AD and non-AD integrated systems, and the necessity of maintaining detailed documentation for enhanced cybersecurity. Real-life examples and practical advice underscore the importance of curiosity and constant improvement in IT security practices, with regular reviews and a proactive approach to identifying and mitigating risks. Microsoft Entra Password Protection - Microsoft Entra ID | Microsoft Learn https://learn.microsoft.com/en-us/entra/identity/authentication/concept-password-ban-bad-on-premises Group Policy: Automatically Delete User Profiles Older Than Certain Number of Days Win 10 not working. - Microsoft Q&A https://learn.microsoft.com/en-us/answers/questions/441800/group-policy-automatically-delete-user-profiles-ol 00:00 Introduction and Episode Overview 00:04 Listener's Request: Active Directory Audit 02:14 Account Hygiene Tips and Auditing Processes 02:36 Handling Stale Accounts and Group Policies 04:48 Group Memberships and Elevated Access 09:35 Password Management and Security 16:41 Auditing GPOs and Password Expirations 19:56 Dynamic Groups and Documentation 29:34 File Sharing and Ransomware Stories 31:38 The Dangers of Open Shares 32:37 The Importance of Regular Audits 32:55 Onboarding and Job Role Audits 33:49 Offboarding and Permission Management 34:48 Curiosity in Cybersecurity 35:40 Overprovisioning Security Permissions 41:12 Vendor Access and Security Tools 46:30 Monitoring and Auditing Best Practices 47:57 Tools and Techniques for Better Security 51:36 The Importance of Continuous Improvement 01:01:52 Final Thoughts and Listener Engagement…
 
Crisis Management: Lessons from Hurricane Helene In this episode of Off the Wire, hosts Anthony and Tanner discuss the impact of Hurricane Helene on regions like Western North Carolina and Eastern Tennessee, focusing on technological challenges and solutions. Tanner, from Blue Ridge Energy, shares insights into infrastructure resilience and the importance of multiple internet connections during disasters. They explore the role of alternative internet sources like Starlink, and highlight the value of having redundant systems and communicating with service vendors during crises. The episode also delves into challenges with cellular networks, emergency power setups, and the need for maintaining cybersecurity protocols during disasters. They emphasize the importance of supporting relief efforts and the psychological impact of witnessing such devastation. 00:00 Introduction and Welcome 00:09 Impact of Hurricane Helene 01:17 Devastation and Recovery Efforts 02:21 Technology Challenges During the Disaster 02:37 Internet Connectivity Issues 04:08 Starlink as a Backup Solution 10:09 Cellular Connectivity During the Crisis 18:53 Burnout and Mental Health Please feel free to contact us at show@offtheirepodcast.com…
 
O
Off the Wire: A Play by Play on Cybersecurity and Technology Issues
Off the Wire: A Play by Play on Cybersecurity and Technology Issues podcast artwork
 
In Episode 23 of Off The Wire, Tanner and Anthony, two seasoned IT executives, delve into IT budgeting. They discuss their experiences, tips, and strategies for creating effective technology budgets, emphasizing the importance of aligning budgets with strategic plans. The episode covers auditing existing technology stacks, communicating with stakeholders, leveraging automation, and investing in staff training. Tanner and Anthony also explore future technology trends for 2025, such as AI, project management tools, and enhanced cybersecurity measures. Listeners are invited to contribute their thoughts on 2025 investments, making this a comprehensive guide for IT professionals navigating budget season.…
 
O
Off the Wire: A Play by Play on Cybersecurity and Technology Issues
Off the Wire: A Play by Play on Cybersecurity and Technology Issues podcast artwork
 
Integrating ChatGPT: Your Newest Cyber Team Member In this episode of 'Off the Wire,' Anthony and Tanner explore the impact of ChatGPT on the cybersecurity field. With a combined 35 years of experience, they discuss harnessing ChatGPT to enhance cybersecurity measures and tackle modern technology challenges. They delve into ways ChatGPT can assist, such as generating policies, creating scripts, aiding in tabletop exercises, supporting incident response, and more. The episode also covers potential concerns about privacy and data security when using ChatGPT. Concluding with actionable insights, the hosts emphasize the importance of embracing AI technologies to improve efficiency and cybersecurity posture. 00:00 Introduction to Off the Wire Podcast 00:35 ChatGPT: The Newest Member of Your Cyber Team 01:32 Generative AI: Benefits and Concerns 03:33 Practical Uses of ChatGPT in Cybersecurity 04:51 Enhancing Cybersecurity Policies with AI 07:38 Incident Response and Script Creation with ChatGPT 11:58 Advanced Uses: Tabletop Exercises and Phishing Training 13:33 Incident Response Support and Log Analysis 19:14 Summarizing Reports and Enhancing Efficiency 27:12 Privacy Concerns and Safe Usage of AI 31:13 Final Thoughts and Podcast Outro…
 
- Hosts: Anthony and Tanner, IT executives with 35 years of combined experience. - Episode Title: One Password to Rule Them All: The Case for Password Managers in the Enterprise. - Overview: Discussing the importance and benefits of password managers in the enterprise, sparked by personal experiences. Segment 1: The Need for Password Managers Problem Statement: - Frequent issues with lost passwords and user frustration with managing multiple complex passwords. - Importance of providing a password manager to prevent unapproved, less secure solutions. - 34% of employees use unapproved apps/tools, increasing security risks. Segment 2: Benefits of Enterprise Password Managers Security & Convenience: - Simplifies creation of complex passwords and supports MFA. - Allows secure sharing of passwords within teams. - Can lower cybersecurity insurance costs and help with compliance. Segment 3: Choosing the Right Password Manager** Open Source vs. Closed Source: - Open Source: Transparency, community review (e.g., KeePass, Bitwarden). - Closed Source: Often better support and UI (e.g., Keeper, 1Password). Tool Highlights: - Bitwarden: Open source, highly secure, supports self-hosting. - Keeper: Closed source, user-friendly, dark web monitoring. - LastPass: Not recommended due to past security breaches. Segment 4: Implementation Tips Start Small: - Pilot with a small, tech-savvy group. - Gradual rollout with strong training and support. Balance Security and Usability: - Tailor security settings to user needs and require MFA. Segment 5: The Future - Passkeys Passkeys Overview: - Passwordless authentication using cryptographic keys, a potential future replacement for passwords. Conclusion: Final Thoughts: - Encourage providing password managers that align with security policies. - Call to Action: Subscribe, share, and provide feedback for future episodes. - Closing Remarks: Thanks to listeners and recent giveaway winners.…
 
**Introduction** - **Welcome Back:** Recap of the podcast’s focus on cybersecurity risk and technology challenges. - **Hosts’ Background:** Brief intro of Anthony and Tanner. - **Guest Introduction:** Anthony introduces Patrick Kelley from Leargas Security and Critical Path Security, who spoke about mental health at a recent cybersecurity conference. **Main Discussion** 1. **Guest’s Personal Journey** - Patrick shares his struggles with reading during childhood and how he overcame these challenges to succeed in cybersecurity. - The role of spite and determination in his early career, transitioning to more positive motivations later. 2. **Mental Health in Cybersecurity** - Discussing how Patrick manages imposter syndrome and the importance of mental health in leadership. - Patrick’s approach to supporting his team’s well-being, including forced PTO and promoting work-life balance. 3. **Leadership and Delegation** - The challenges of delegation, especially with trust issues. - Practical tips on effective delegation and building trust within a team. 4. **Cybersecurity Insights** - Importance of calm leadership during cybersecurity incidents. - Tips for SMBs, focusing on consolidating tools and starting with cybersecurity basics. 5. **Role of a Virtual CISO** - Explanation of what a vCISO is and how it can benefit SMBs, particularly in the energy sector. - Patrick’s commitment to serving the EMC community with affordable cybersecurity solutions. **Conclusion** - **Final Thoughts:** Emphasizing the importance of mental health in the cybersecurity industry. - **Call to Action:** Encouraging listeners to subscribe and follow on social media. - **Closing:** Thanking the guest and listeners, with a reminder to tune in for future episodes.…
 
O
Off the Wire: A Play by Play on Cybersecurity and Technology Issues
Off the Wire: A Play by Play on Cybersecurity and Technology Issues podcast artwork
 
Tools Referenced: Free SPF/DKIM/DMARC analyzer tools for DMARC setup - DMARCLY Learn and Test DMARC (learndmarc.com) DMARC Check Tool - Domain Message Authentication Reporting & Conformance Lookup - MxToolBox **Introduction:** **Welcome & Hosts Introduction:** - “Welcome back to Off The Wire, the podcast that helps you curb cybersecurity risks and tackle technology challenges.” - Introduction of hosts, Anthony and Tanner, with 35 years of combined IT and cybersecurity experience. **Episode Overview:** - Quick mention of today’s key topics: a special giveaway, an update on CrowdStrike, and an essential guide to email security (SPF, DKIM, DMARC). **Listener Appreciation & Giveaway:** - Celebrate the 20th episode and approaching 1,000 downloads. - **Giveaway Details:** - **Prizes:** ICON Flex Head Ratchet, Wera Ratcheting Screwdriver, Anker Wireless Earbuds. - **How to Enter:** - Review the podcast on any platform. - Share this episode on social media. - Email to the show’s email address to let us know. - **Drawing Date:** August 16th. **CrowdStrike Update & Cybersecurity Litigation:** - Discuss the ongoing CrowdStrike issue and Delta Airlines litigation. - Explore the implications of cybersecurity failures leading to lawsuits and potential industry impacts. **Guardians of the Email Galaxy (SPF, DKIM, DMARC):** - **SPF:** Prevent domain spoofing through proper SPF record setup. - **DKIM:** Ensure email integrity with digital signatures. - **DMARC:** Implement policies to manage failed SPF/DKIM checks and protect your domain’s reputation. - **Bonus:** Introduction to Verified Mark Certificates (VMC) for enhancing email trust. **Final Thoughts & Call to Action:** - Recap the importance of securing your email with SPF, DKIM, and DMARC. - Encourage listeners to verify their setups and enter the giveaway. - Reminder to subscribe and send feedback for future episodes. **Closing Remarks:** - Mention of upcoming episodes and acknowledgment of current events. - Thank listeners and sign off.…
 
O
Off the Wire: A Play by Play on Cybersecurity and Technology Issues
Off the Wire: A Play by Play on Cybersecurity and Technology Issues podcast artwork
 
Podcast Outline: "Off the Wire" Episode Intro: Welcome back to "Off the Wire," the podcast helping you curb cybersecurity risks and tackle technology challenges. Hosts: Tanner and Anthony, IT executives with a combined 35 years of experience in IT and cybersecurity. Teaser for Episode 20: Upcoming giveaway in two weeks—details to come. Main Topic: Low-Cost, High-Impact Cybersecurity Investments Introduction to the Topic Discuss the challenges faced by small to medium-sized businesses in allocating budgets for cybersecurity. The importance of prioritizing cybersecurity efforts even with limited resources. Understanding Budget Constraints and Other Challenges Budget limitations and other constraints like legacy applications and organizational resistance to change. The need to prioritize cybersecurity based on the greatest risk and potential impact. Cybersecurity Prioritization Strategies Utilizing free or low-cost open-source tools when possible. Considerations for choosing between free tools and paid solutions based on staff availability and skill level. Cybersecurity Frameworks and Assessment Importance of assessing the current state of cybersecurity. Recommendations for using the CIS framework or similar tools for benchmarking and setting priorities. The value of starting with a basic maturity level and progressively advancing. Key Focus Areas for Low-Cost Cybersecurity Measures Asset Management: Importance of knowing what's on your network. Free and low-cost tools like Snipe-IT and Spiceworks for asset management. Strong Passwords and Multi-Factor Authentication (MFA): Using free tools like Microsoft Authenticator or Google Authenticator. Implementing password managers for better security and efficiency. Regular Updates and Patching: The critical role of updates in preventing security breaches. Options for automated patch management solutions. Incident Response and Business Continuity Planning: Developing and maintaining security plans and policies. Storing physical copies of these plans for accessibility during crises. Additional Low-Cost Solutions Threat Intelligence: Leveraging free industry-specific threat intelligence resources and communities. Utilizing platforms like Reddit for real-time information on vulnerabilities and threats. Email Security: Importance of investing in additional layers of email security. Mention of tools like Avanan and Microsoft Defender. Optimizing Existing Investments: Making full use of existing tools and software, especially in environments like Microsoft 365. EDR Solutions: The importance of Endpoint Detection and Response (EDR) in mitigating breaches. Notable EDR solutions and their benefits. Backups and Disaster Recovery The necessity of regular and tested backups. Considering both free and paid backup solutions. The importance of documenting and testing backup processes. Creating a Cyber Go-Bag The concept and contents of a cyber go-bag for emergency response. Recommendations for setting up a go-bag, including tools and documentation. Connecting Cybersecurity to Business Objectives Emphasizing the alignment of cybersecurity goals with overall business objectives. Importance of communicating cybersecurity successes and needs to leadership. Conclusion: Recap of key points and encouragement to implement the discussed strategies. Reminder about the upcoming Episode 20 giveaway. Call to action: Subscribe, share the podcast, and reach out with episode ideas or feedback. Closing Remarks: Next episode preview and sign-off.…
 
Introduction: - Welcome back to a bonus episode of Off the Wire. - Highlight of the week: a bad patch pushed out by CrowdStrike caused worldwide outages. Initial Impact: - Anthony's experience: dealing with server and workstation blue screens. - Timeline of the incident: starting at 12:09 AM with alerts coming in around 12:40 AM. - Initial thoughts and confusion about the cause of the outages. Incident Breakdown: - Detailed recount of the events from the first alert to the realization of the issue. - Actions taken: communicating with the team, creating a list of affected servers, and initial troubleshooting steps. - The emotional toll: dealing with the uncertainty and high-stress situation. Discovery and Response: - Identifying the issue was linked to CrowdStrike after finding relevant information on their support portal. - Relief upon realizing it was not a hack but a bad patch. - Steps taken to mitigate the issue: removing CrowdStrike from systems, following CrowdStrike's fix instructions. Operational Challenges: - Logistics of fixing the issue across remote and local systems. - Game plan for addressing workstation issues at different office locations. - The coordination effort: managing communications and task delegation. Post-Incident Reflection: - The importance of a coordinated response and having a "bug-out" bag. - CrowdStrike's handling of the incident and the need for transparency. - Discussion on potential industry-wide implications and the fragility of IT infrastructure. Impact and Future Considerations: - Worldwide impact: other organizations affected including critical infrastructure. - Reflection on CrowdStrike's reputation and future trust. - Legal and liability considerations for CrowdStrike in various jurisdictions. Closing Thoughts: - The importance of preparedness and having a response plan in place. - Lessons learned from the incident and changes to be implemented. - Invitation to listeners to share feedback and follow on social media. Outro: - Thanks for joining this bonus episode. - Reminder about the regular podcast schedule and mention of recent episodes. - Encouragement to share the podcast with others and stay tuned for more content.…
 
Introduction: Host Introduction: Tanner Greer and Anthony Kent, two IT executives with 35 years of combined experience in the IT field, specializing in cybersecurity. Episode Overview: Discussion on Zero Trust security. Segment 1: Conference Recap Anthony's recent attendance at the IT conference for South Carolina co-ops. Key takeaway: Importance of IT communication with non-IT stakeholders, avoiding jargon and using relatable examples. Segment 2: Understanding Zero Trust Zero Trust explained: "Never trust, always verify." History of Zero Trust: Coined by John Kindervag in the 90s and popularized in the 2000s. Shift in mindset: From securing trusted internal networks to assuming all networks are potentially hostile. Segment 3: Key Concepts of Zero Trust Basic principles: Never trust, always verify; least privilege; and assume breach. NIST guidance on Zero Trust (800-207). Segment 4: Implementing Zero Trust Defining the protect surface: Identify what needs protection. Mapping transaction flows: Understand how data moves. Architecting Zero Trust: Building a secure infrastructure. Creating Zero Trust policies: Setting rules and guidelines. Monitoring and maintaining: Continuous improvement and vigilance. Segment 5: Real-world Application Anthony's recent project: Redesigning an OT environment using Zero Trust principles. Challenges and solutions: VLAN segmentation, micro-segmentation, and user/device checks. Segment 6: Lessons Learned Importance of strategic goals: Integrating Zero Trust into organizational strategy. Using existing tools effectively: Leveraging current technology to implement Zero Trust. Practical tips: Start with test environments, prioritize critical applications, and consider business operations. Segment 7: Pitfalls and Considerations Usability impact: Balancing security measures with operational needs. Internal threats: Monitoring for suspicious internal activities. Continuous monitoring: Importance of regular checks and updates. Segment 8: Resources and References Recommended reading: "Project Zero Trust" book. Key documents: NIST 800-207 and CISA's Zero Trust Maturity Model. Conclusion: Recap of the episode. Encouragement to start the Zero Trust journey: Don't be overwhelmed; take it step by step. Final thoughts: Zero Trust as a critical part of modern cybersecurity strategies. Closing: Reminder to check previous episodes. Contact information: Website, email, and social media handles. Episode release schedule: Every other Monday. Sign-off: Hosts' sign-off and thanks for listening.…
 
Introduction Welcome to the Show: Greet listeners and introduce the podcast name. Briefly describe the purpose of the podcast and what listeners can expect. Hosts Introduction: Anthony and Tanner, two IT executives with a combined 35 years of experience in IT and cybersecurity. Background on their roles and the companies they lead. Brief mention of past episodes to give new listeners context. Episode Overview: Introduction to today’s topic: Finding, Hiring, and Retaining Technology Employees. Importance of the topic in the current IT landscape. Segment 1: Weekly Updates Anthony’s Update: Recap of the conference attended. Key takeaways and interesting trends observed. Details on the new SCADA system being prepared for implementation. Challenges and excitement related to the new system. Tanner’s Update: Current issues being tackled in the company. Specifics about the online ads issue and its impact on the business. Steps taken to mitigate the problem. Broader discussion on the state of online ads and cybersecurity concerns. Segment 2: Introduction to Main Topic Brief Introduction: Overview of the main topic: The critical aspects of finding, hiring, and retaining technology employees. Why this topic is particularly relevant now. Personal experiences and why this topic matters to Anthony and Tanner. Segment 3: Challenges in Hiring Technology Employees Attracting Talent in SMBs: The difficulty small and medium-sized businesses (SMBs) face compared to larger corporations. Discussion on limited resources and lesser-known brand recognition. Location-Based Challenges: How geographical location affects the talent pool. Case examples from Anthony and Tanner’s experiences. Remote Job Market Competition: The rise of remote work and its impact on local hiring. Specific roles (e.g., data analysts, developers) that are particularly affected. Salary Disparities: Comparison of pay scales between SMBs and large enterprises. Strategies to offer competitive compensation packages. Segment 4: Advantages of Working in SMBs Close-Knit Work Environment: Describing the family-like atmosphere in smaller organizations. Personal anecdotes from Anthony and Tanner. Direct Interaction with Leadership: Opportunities for employees to interact with top executives. The benefits of having a direct line to decision-makers. Impact and Recognition: How individual contributions are more visible in smaller settings. Examples of significant projects led by team members. Flexibility and Work-Life Balance: Offering flexible schedules and remote work options. Balancing personal interests and professional responsibilities. Segment 5: Strengthening Recruitment Strategies Highlighting Advantages in Job Postings: Crafting compelling job descriptions that attract top talent. Emphasizing unique benefits and company culture. Promoting Company Culture and Values: The importance of a strong organizational culture. Ways to communicate this during the hiring process. Competitive Salary and Benefits Packages: Offering market-competitive salaries. Additional benefits that make a difference (e.g., healthcare, retirement plans). Community Involvement and Reputation: How being active in the community can enhance your company’s attractiveness. Success stories from Anthony and Tanner’s companies. Segment 6: Retention Strategies Work-Life Balance: Policies that support employees’ personal lives. Encouraging hobbies and outside interests. Team-Building Activities: Organizing regular team outings and events. The role of informal gatherings in building team cohesion. Autonomy and Leadership Opportunities: Allowing employees to lead projects. Offering professional development and career growth opportunities. Flexible Work Arrangements: Implementing hybrid work models. Adapting to individual needs for remote work. Segment 7: Internships and Temporary Positions Benefits of Internships: How internships can serve as a talent pipeline. Providing real-world experience to interns. Challenges of Implementing Internship Programs: Security and training concerns. Ensuring meaningful projects for short-term interns. Success Stories: Examples of interns who became full-time employees. The impact of internships on both the company and the interns. Segment 8: Screening and Interviewing Processes Technical Interviews and Assessments: Different approaches to evaluating technical skills. The importance of practical assessments. Cultural Fit and Team Dynamics: Assessing candidates for cultural and team fit. Techniques for determining alignment with company values. Pre-Employment Tests: The role of cognitive and personality tests in the hiring process. Pros and cons of using these tests. Segment 9: Final Thoughts on Hiring and Retaining Talent Balancing Long-Term and Immediate Impact: The value of hiring for both short-term gains and long-term stability. Strategies for keeping high-impact employees engaged. Fostering a Positive Work Culture: Continuous efforts to maintain and improve workplace culture. Engaging employees in meaningful ways to ensure retention. Continuous Improvement of Recruitment Processes: Regularly reviewing and refining hiring practices. Staying updated with industry trends and best practices. Conclusion Listener Engagement: Encourage listeners to share their experiences and strategies. Invite feedback and topic suggestions for future episodes. Call to Action: Subscribe to the podcast. Leave reviews and share the podcast with others. Follow on social media platforms. Outro Reminder of Release Schedule: Biweekly episodes released every other Monday. Tease the topic of the next episode to keep listeners engaged. Thank You: Thank listeners for their support and engagement. Encourage them to reach out with questions, feedback, or topic ideas.…
 
O
Off the Wire: A Play by Play on Cybersecurity and Technology Issues
Off the Wire: A Play by Play on Cybersecurity and Technology Issues podcast artwork
 
Podcast Episode Show Notes: Importance of Incident Response Plans (IRPs) Episode Highlights: Rising Cybersecurity Threats:Discussing the increasing threat levels and the growing importance of cybersecurity. Incident Response Plans (IRPs): Why IRPs are essential and how they serve as a playbook during cyber incidents. Key Topics Covered: Need for IRPs: Importance for regulatory compliance (HIPAA, GDPR, PCI). Legal requirements and state breach laws. Adhering to cybersecurity frameworks like NIST and CIS. Simplicity and Accessibility: IRPs should be simple enough for the least experienced technical staff to understand and use. Regular Reviews and Updates: Importance of annual or quarterly reviews to keep the IRP current. Conducting tabletop exercises to test and refine the IRP. Documentation: Importance of centralized and proper documentation during incidents. Stakeholder Involvement: Involving legal, communications, accounting, and other relevant departments in the IRP. Top-Down Buy-In: Securing support from top management to facilitate smoother implementation and adherence. Practical Tools: Creating a "go bag" with necessary tools and documentation for incident response. Resources and Templates: Utilizing resources like the CIS IRP template and industry-specific frameworks for effective IRPs. Final Advice: Start with what you have, involve stakeholders, keep the plan simple, and ensure regular reviews and updates. Additional Resources: CIS IRP Template: Link to CIS IRP Template Contact Us: Email us at show@offthewirepodcast.com or visit our website for more information. Stay Connected: Subscribe: Don’t miss an episode – subscribe to our podcast. Follow Us: Connect with us on YouTube, X, Facebook, and LinkedIn. Join the Conversation: Share your thoughts and engage with us on social media. Next Episode: Join us next time for more insights on cybersecurity and technology. New episodes drop every other Monday! We hope you enjoyed this episode. If you found it helpful, please share it with your colleagues and friends. Thank you for listening to Off the Wire Podcast!…
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش